메뉴 건너뛰기




Volumn 6632 LNCS, Issue , 2011, Pages 589-609

Threshold and revocation cryptosystems via extractable hash proofs

Author keywords

[No Author keywords available]

Indexed keywords

BROADCAST ENCRYPTION SCHEMES; CRYPTOSYSTEMS; EXPONENTIAL NUMBERS; NON-INTERACTIVE; RABIN SIGNATURE; RANDOM ORACLE MODEL; SIGNATURE SCHEME; THRESHOLD ENCRYPTION; THRESHOLD SIGNATURE; ZERO KNOWLEDGE PROOF;

EID: 79958014514     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-20465-4_32     Document Type: Conference Paper
Times cited : (21)

References (42)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The oracle diffie-hellman assumptions and an analysis of DHIES
    • Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
    • Abdalla, M., Bellare, M., Rogaway, P.: The oracle diffie-hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143-158. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 77954625601 scopus 로고    scopus 로고
    • Efficient lattice (H)IBE in the standard model
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 3
    • 77949577768 scopus 로고    scopus 로고
    • Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Bendlin, R., Damgård, I.: Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 201-218. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 201-218
    • Bendlin, R.1    Damgård, I.2
  • 4
    • 0020932981 scopus 로고
    • Comparison of two pseudo-random number generators
    • Blum, L., Blum, M., Shub, M.: Comparison of two pseudo-random number generators. In: CRYPTO 1982, pp. 61-78 (1982)
    • (1982) CRYPTO 1982 , pp. 61-78
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 5
    • 84949995981 scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 289-299. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 289-299
    • Blum, M.1    Goldwasser, S.2
  • 6
    • 0003153237 scopus 로고
    • Non-interactive zero-knowledge and its applications
    • Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: STOC, pp. 103-112 (1988)
    • (1988) STOC , pp. 103-112
    • Blum, M.1    Feldman, P.2    Micali, S.3
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586-615 (2003)
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptology 17(4), 297-319 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 9
    • 33745655389 scopus 로고    scopus 로고
    • Chosen ciphertext secure public key threshold encryption without random oracles
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Boneh, D., Boyen, X., Halevi, S.: Chosen ciphertext secure public key threshold encryption without random oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 226-243. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 226-243
    • Boneh, D.1    Boyen, X.2    Halevi, S.3
  • 10
    • 33745767987 scopus 로고    scopus 로고
    • Direct chosen ciphertext security from identity-based techniques
    • Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: ACM CCS, pp. 320-329 (2005)
    • (2005) ACM CCS , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 11
    • 84957712291 scopus 로고    scopus 로고
    • An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Canetti, R., Goldwasser, S.: An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 90-106. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2
  • 12
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 13
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 14
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 15
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 16
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • Kim, K.-c. (ed.) PKC 2001. Springer, Heidelberg
    • Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 17
    • 85028462775 scopus 로고
    • Zero-knowledge proofs of knowledge without interaction
    • De Santis, A., Persiano, G.: Zero-knowledge proofs of knowledge without interaction. In: FOCS, pp. 427-436 (1992)
    • (1992) FOCS , pp. 427-436
    • De Santis, A.1    Persiano, G.2
  • 19
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120-127. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 20
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 21
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • extended abstract. Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures (extended abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457-469. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 22
    • 35248899841 scopus 로고    scopus 로고
    • Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    • Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
    • Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 100-115. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2567 , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 23
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 24
    • 84946827596 scopus 로고    scopus 로고
    • Threshold cryptosystems secure against chosen-ciphertext attacks
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Fouque, P.-A., Pointcheval, D.: Threshold cryptosystems secure against chosen-ciphertext attacks. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 351-368. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 351-368
    • Fouque, P.-A.1    Pointcheval, D.2
  • 25
    • 84944328129 scopus 로고    scopus 로고
    • Sharing decryption in the context of voting or lotteries
    • Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
    • Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90-104. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1962 , pp. 90-104
    • Fouque, P.-A.1    Poupard, G.2    Stern, J.3
  • 26
    • 0029713931 scopus 로고    scopus 로고
    • Witness-based cryptographic program checking and robust function sharing
    • Frankel, Y., Gemmell, P., Yung, M.: Witness-based cryptographic program checking and robust function sharing. In: STOC, pp. 499-508 (1996)
    • (1996) STOC , pp. 499-508
    • Frankel, Y.1    Gemmell, P.2    Yung, M.3
  • 27
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 354-371. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 28
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and efficient sharing of RSA functions. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 157-172. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 29
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295-310. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 30
    • 44449121781 scopus 로고    scopus 로고
    • Threshold RSA for dynamic and ad-hoc groups
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T.: Threshold RSA for dynamic and ad-hoc groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 88-107. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 88-107
    • Gennaro, R.1    Halevi, S.2    Krawczyk, H.3    Rabin, T.4
  • 31
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC, pp. 25-32 (1989)
    • (1989) STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 32
    • 67650677267 scopus 로고    scopus 로고
    • Practical chosen ciphertext secure encryption from factoring
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 313-332
    • Hofheinz, D.1    Kiltz, E.2
  • 33
    • 70350302871 scopus 로고    scopus 로고
    • The group of signed quadratic residues and applications
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: The group of signed quadratic residues and applications. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 637-653. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 637-653
    • Hofheinz, D.1    Kiltz, E.2
  • 34
    • 84958741591 scopus 로고    scopus 로고
    • Threshold cryptosystems based on factoring
    • Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
    • Katz, J., Yung, M.: Threshold cryptosystems based on factoring. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 192-205. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 192-205
    • Katz, J.1    Yung, M.2
  • 35
    • 38049077895 scopus 로고    scopus 로고
    • Chosen-ciphertext secure key-encapsulation based on gap hashed diffie-hellman
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Kiltz, E.: Chosen-ciphertext secure key-encapsulation based on gap hashed diffie-hellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 282-297. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 282-297
    • Kiltz, E.1
  • 36
    • 84944319284 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
    • Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 37
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC, pp. 427-437 (1990)
    • (1990) STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 38
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 39
    • 38049015677 scopus 로고
    • On the generation of cryptographically strong pseudorandom sequences
    • Shamir, A.: On the generation of cryptographically strong pseudorandom sequences. ACM Trans. Comput. Syst. 1(1), 38-44 (1983)
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.1 , pp. 38-44
    • Shamir, A.1
  • 40
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207-220. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 41
    • 1842599265 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptology 15(2), 75-96 (2002)
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 75-96
    • Shoup, V.1    Gennaro, R.2
  • 42
    • 77957000385 scopus 로고    scopus 로고
    • Efficient chosen-ciphertext security via extractable hash proofs
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Wee, H.: Efficient chosen-ciphertext security via extractable hash proofs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 314-332. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 314-332
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.